CN114095466A - Nested collaboration in email - Google Patents

Nested collaboration in email Download PDF

Info

Publication number
CN114095466A
CN114095466A CN202111520271.6A CN202111520271A CN114095466A CN 114095466 A CN114095466 A CN 114095466A CN 202111520271 A CN202111520271 A CN 202111520271A CN 114095466 A CN114095466 A CN 114095466A
Authority
CN
China
Prior art keywords
message
user
content
recipient
reply
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111520271.6A
Other languages
Chinese (zh)
Other versions
CN114095466B (en
Inventor
L·钟
S·索尼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
Priority to CN202111520271.6A priority Critical patent/CN114095466B/en
Publication of CN114095466A publication Critical patent/CN114095466A/en
Application granted granted Critical
Publication of CN114095466B publication Critical patent/CN114095466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/216Handling conversation history, e.g. grouping of messages in sessions or threads

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Electronic mail (e-mail) systems detect when a user is replying to a particular portion of content in a received message. The reply is automatically formatted to distinguish the reply from replies from other recipients to the same content portion.

Description

Nested collaboration in email
The present application is a divisional application of an invention patent application with application number 201780036442.3 entitled "nested collaboration in email" filed on 9/6/2017.
Background
Computer systems are currently in widespread use. Some such computer systems include email systems. Email systems allow users to compose, send, and receive email messages and perform other email system functions.
It is not uncommon for users of an email system to attempt to use the email system in cooperation with each other. For example, an author of an email message may include a list of questions in the message content and send the message to a number of different recipients. Each recipient may then reply to each of these questions. This may be accomplished, for example, by the recipient copying and pasting the individual questions into a reply message, and then entering the recipient's personal response to each question in the reply message. This may also be done by the recipient typing a response nested (in-line) with the content of the original email message.
This can become confusing. For example, one recipient may reply to a message and then forward his or her reply to the other recipient or author of the original email message, or both. Multiple different recipients may send multiple different replies and it may be difficult to maintain the integrity of all replies.
The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
Disclosure of Invention
Electronic mail (e-mail) systems detect when a user is replying to a particular portion of content in a received message. The reply is automatically formatted to visually distinguish the reply from replies from other recipients to the same content portion.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
Drawings
FIG. 1 is a block diagram of one example of a computing system architecture.
FIG. 2 is a block diagram illustrating one example of issue message processing logic in greater detail.
FIG. 3 is a flow chart illustrating one example of the operation of the architecture shown in FIG. 1 that allows a user to compose a question message in an email system.
FIG. 4 is a flow chart illustrating operation of the architecture shown in FIG. 1 to automatically format replies to messages in an email system.
Fig. 5A and 5B illustrate examples of user interface displays.
FIG. 6 is a block diagram of one example of the architecture shown in FIG. 1 deployed in a cloud computing architecture.
Fig. 7-9 illustrate examples of mobile devices that may be used in the architecture shown in the previous figures.
FIG. 10 is a block diagram of one example of a computing environment that may be used in the architecture shown in the previous figures.
Detailed Description
FIG. 1 is a block diagram of one example of a computing system architecture 100. Architecture 100 illustratively includes computing systems 102 and 104 connected by a network 106. The network 106 may be any of a wide variety of different types of networks, such as a wide area network, a local area network, a cellular network, a near field communication network, and so forth.
In one example, fig. 1 also shows the computing system 102 generating a user interface 108 with user input mechanisms 110 for interaction by a user 112. The computing system 104 also illustratively generates a user interface 114 having user input mechanisms 116 for interaction by a user 118. User 112 illustratively interacts with user input mechanisms 110 to control and manipulate computing system 102. The user 118 illustratively interacts with the user input mechanisms 116 to control and manipulate the computing system 104.
Before describing the operation of the architecture 100 in more detail, an overview of some of the items in the architecture 100 and their operation will first be provided. Computing system 102 illustratively includes a processor or server 120, an electronic mail (e-mail) system 122, a data storage device 124, user interface logic 126, and it may include other items 128. The email system 122 itself illustratively includes issue message handling logic 130 and it may include a wide variety of other email functions 132. Data 124 illustratively includes user identification information 134, and it may include other items 136.
The email system 122 may be an email service or a client component of an email service, or a combination. It illustratively generates a user interface display with user input mechanisms that allow the user 112 to perform email operations, such as composing messages, sending and receiving messages, replying to messages, attaching items, organizing mailbox folders, and the like.
The issue message processing logic 130 illustratively allows a user composing a message to mark the message as an issue message (e.g., a message that conforms to an issue message schema), which will be described in more detail below. In addition, it also automatically identifies when the user replies to a given content portion in the received message. It illustratively formats the reply in such a way as to visually distinguish the reply from the original text in the received message, and from any other replies to the same text portion by other recipients. This is also described in more detail below.
User interface logic 126 illustratively generates user interface displays and detects user inputs from the various user input mechanisms 110 and notifies other components of computing system 102 of those detected inputs. The data storage device 124 may store applications and a wide variety of other items that may be used by the computing system 102 in addition to the user identification information 134.
In the example shown in fig. 1, computing system 104 also illustratively includes one or more processors or servers 140, an email system 142, a data storage 144, user interface logic 146, and it may include other items 148. The email system 142 illustratively includes issue message handling logic 150 and a wide variety of other email functions 152. The data storage device 144 also illustratively includes user identification information 154, and it may include other items 156.
Like email system 122, email system 142 may be an email service, a client component of a hosted email service, or another type of email system. User interface logic 146 illustratively generates user interface 114 and detects user input through user input mechanism 116. It may inform other items of the computing system 104 about those inputs so that the user 118 can control and manipulate the computing system 104.
FIG. 2 is a block diagram of one example of the issue message processing logic 130 in greater detail. It will be appreciated that the logic 130 will be provided, but it may be the same as the issue message processing logic 150 on the computing system 104, or they may be different. For the purposes of this discussion, it will be assumed that both are similar and that they operate similarly. Thus, the description of the issue message processing logic 130 may be applied simply to the issue message processing logic 150.
The logic 130 illustratively includes a problem pattern identifier 160, a tag generation system 162, and it may include a wide variety of other items 164. The problem pattern identifier 160 illustratively identifies when a message in the email system 122 follows a problem pattern such that it should be processed using the logic 130. In one example, question pattern identifier 160 identifies whether an email message being composed by the user follows a question pattern (such that it should be treated as a question email and processed using logic 130). The question mode may be any mode in which an email message contains a set of questions or points to which the message recipient is to respond in a reply message. Thus, a pattern may be a series of questions, a series of points, or other patterns. Some of these are described in more detail below.
In another example, the question pattern identifier 160 determines whether the recipient of the email message is replying in a manner such that the reply should be treated as a reply to the question email regardless of whether the original message being replied to followed the question pattern. For example, it may be that the author of the original email has not drafted the email in a manner that follows the question pattern, but the recipient still replies to some of the points or text portions of the original email. Both of which will be described in more detail below.
The issue pattern identifier 160 thus illustratively includes an author processing system 166 and a recipient processing system 168, and it may include other items 170. Author processing system 166 illustratively includes character analysis logic 172, linguistic content analysis logic 174, user interaction logic 176, and it may include other items 178.
Character analysis logic 172 illustratively analyzes the characters in the email message being composed or composed to determine whether it follows a question pattern. For example, if the characters show that the author has typed multiple text snippets followed by a question mark, this may indicate that the author is composing a list of questions, and thus the email follows the question pattern and should be treated as a question email.
The linguistic content analysis logic 174 may include natural language understanding or natural language processing components (or it may have access to those components) that generate an understanding of the semantic or linguistic content of the email to determine whether it should be treated as a question email. For example, it is possible for an author to type a sentence fragment such as "please respond to the following points" and then list a set of points. In this case, semantic analysis of the content of the email may indicate that the email should be treated as a problem email because it follows a problem pattern.
User interaction logic 176 may be used to request input from a user (e.g., author) to confirm whether the email is indeed a problem email. For example, when logic 173 or logic 174 (or other logic 178) determines that the e-mail being composed may indeed be a question e-mail, then user interaction logic 176 may generate a pop-up display that asks the author whether he or she would like the e-mail to be treated as a question e-mail. In another example, the user interaction logic 176 displays a button on a composition pane (or adjacent composition pane) in the electronic mail system that the user can actuate to actively indicate that the message is to be considered a problem message. All of which are contemplated herein.
Once an email message has been identified as a problem message, tag generation system 162 illustratively marks the email message as a problem message. In addition, the tag generation system 162 can tag the recipient's responses to individual questions posed in the question email so that they can be visually distinguished from each other in the email thread. Thus, the tag generation system 162 illustratively includes message tag generation logic 180, question tag generator logic 182, reply tag generator logic 184, and it may include a wide variety of other items 186.
When the author processing system 166 identifies a message being composed as a problem message, then the message tag generator logic 180 will tag the message with the tag so indicated. When a respective text portion within the message has been identified as a question (or otherwise identified as a text gist to which the recipient responds), then the question label generator logic 182 marks that text portion in the message indicating that it is a question (or another text portion to which a response is made). When the user begins replying to a question (or other text portion), the reply tag generator logic 184 illustratively tags and identifies the recipient's reply with the recipient so that it can be distinguished from other replies to the question by other recipients. Thus, the system 162 tags the question message, each question (or other portion of text specifically responsive thereto), and replies to the tagged question.
Recipient processing system 168 illustratively includes tag identifier logic 190, tag processing activation logic 192, visual formatting logic 194, link generator logic 196, and it may include other items 198. Tag identifier logic 190 identifies any tags that are already present in the message to which the recipient is responding. Tag processing activation logic 192 illustratively identifies when a question (or other text portion) in the original email message will be tagged and when a reply will be tagged and activates tag generation system 162 so that it generates tags for the question and/or portions of the reply message.
Logic 192 thus includes a nested reply identifier 200 that identifies when a recipient generates a reply that is nested with other message content in the original message being replied to. When this is detected, this indicates that the recipient is replying to a particular text portion in the original message. Accordingly, the identifier 200 provides an indication of this to the label generation system 162. The question tag generator logic 182 then identifies and tags as such the particular text portion immediately above the reply that the recipient is entering as a question or other point in the original email message that is being replied to. The reply tag generator logic 184 tags the recipient's reply (e.g., what the recipient is currently entering) as a reply to the above-tagged question and correlates the reply with the particular recipient that generated the reply. In this way, the recipient's reply can be distinguished not only from the problem in the original email message, but also from the replies of other recipients.
The copy and paste reply identifier 202 identifies when the recipient copies and pastes a portion of the original e-mail message (the message being replied to) into the reply pane. This also indicates that the recipient is replying to a particular portion of text in the original message. The identifier 202 thus indicates this to the tag generation system 162. In response, the question tag generator logic 182 identifies the portion of text that the recipient copied and pasted as the question (or other portion of text that the recipient is replying to) and tags it as such. The reply tag generator logic 184 identifies the content entered by the recipient as a reply to the question identified above. The reply tag generator logic 184 tags it as such and identifies the recipient as the person who entered the reply.
The linguistic content identifier 204 tags a portion of the text in the received message as a question (or other portion of text that the recipient is replying to) based on the linguistic content of the recipient's reply. For example, assume that the recipient starts typing in a reply message, e.g., "in response to the following point one: ". This illustratively indicates that the recipient is replying to a particular question or text gist in the original email message. The linguistic content identifier 204 indicates this to the tag generation system 162. In response, the question label generator logic identifies and marks as a question a particular text portion of the original message corresponding to "following point one". It can do this in a variety of different ways. For example, the question tag generator logic may include (or have access to) natural language processing or natural language understanding components that correlate the recipient's reply with a portion of the text in the original message. The question label generator logic may identify the text in other ways as well. The reply tag generator logic 184 also marks the recipient's reply as a reply to the identified question and associates the reply with the particular recipient.
Once the recipient's reply has been tagged (or otherwise identified) as a reply to a particular question or point in the original email message, visual formatting logic 194 automatically formats the recipient's reply. Logic 194 illustratively formats it so that it is visually distinguished from the text in the original email message, and from any other replies from any other recipients to the particular question. In one example, logic 194 may change the size, thickness, color, or other characteristics of the text entered by the recipient. Logic 194 may change the indentation and spacing of the text. The logic 194 may change the font, or it may change the background shading or any other visual feature of the reply to visually distinguish the reply from the original text and from other replies of other recipients. In one example, this is done automatically, so the recipient does not need to manually change any formatting. Instead, once it has been identified that the recipient is responding to a question (or other particular portion of text) in the original message, the logic 194 automatically formats the recipient's reply in this manner, and the recipient need only type in the reply.
The link generator logic 196 illustratively generates a link from the recipient's reply to the underlying identification or biometric information 134 (or 154) for the recipient (which may be stored in the data storage device 124 or 144 or elsewhere). The link generator logic 196 may also generate a header portion of the reply for the recipient to identify the recipient and serve as the visual display element corresponding to the link. For example, the link generator logic 196 may generate a reply such as "Gabe" immediately before or upon the reply of the recipient: "to indicate that the following text is a reply from a particular recipient" Gabe ". When another user hovers his or her mouse over the link, it may provide a summary of the biometric information for the respective recipient (e.g., for Gabe), and when the user actuates the link, it may navigate the user to a more detailed biometric description of the recipient, or it may generate the information on a pop-up display or otherwise.
FIG. 3 is a flow chart illustrating one example of the operation of architecture 100 that allows a user to compose an email and analyze the email to determine if it follows a question pattern and therefore should be treated as a question email. In the example described herein, it will be assumed that user 112 is composing an email message using email system 122. It will also be assumed that user 118 is the recipient of the email message.
Assume first that the email system 122 is open and running and that it displays a compose pane so that the user 112 can compose an email message. The electronic mail system 122 first detects that the user 112 has entered content in a message in a composition pane in the electronic mail system 122. This is indicated by block 220 in fig. 3.
The author processing system 166 then determines whether the message follows the problem pattern and therefore should be treated as a problem message. This is indicated by block 222. In one example, this may be based on user input, e.g., a user actuating an actuator to indicate that the message is a problem message, and this will be detected by user interaction logic 176. Determining that the message is a problem message based on the user input is indicated by block 224 in the flow diagram of fig. 3.
The determination of whether the e-mail message being composed conforms to the question pattern may also be made based on an analysis of the particular characters entered into the message by the user 112. For example, character analysis logic 172 may identify that the user has entered a number of different text snippets, each followed by a question mark. Determining that the email message conforms to the question message pattern based on the entered characters is indicated by block 226.
The linguistic content analysis logic 174 may also identify the message as a question message based on the linguistic or semantic content of the message. This is indicated by block 228.
In one example, the user interaction logic 176 may require the user to confirm that the message should be treated as a question message. This is indicated by block 230. Determining whether the message is a problem message may also be performed in other ways, and this is indicated by block 232.
If the user is still entering text or content into the message, but the message has not been identified as a problem message, processing returns to block 220 where the system continues to determine whether the message is identified as a problem message based on the content entered in block 220. This is indicated by blocks 234 and 236 in fig. 3.
If, however, it is determined at block 234 that the message has been identified as a problem message, the message tag generator logic 180 adds a tag to the message that identifies the message as a problem message, or a message that conforms to a problem pattern, to any recipient email system (e.g., email system 12 in computing system 104). This is indicated by block 238 in fig. 3. Once the message is identified as a problem message, the components of the author processing system 166 may also identify a particular problem. The issue tag generator logic 182 illustratively tags those issues as such. This is indicated by block 239.
At some point, the user 112 will finish composing the message and actuate the send actuator to send the email to one or more recipients. Detecting user actuation of the sending actuator and sending the message to the identified recipient is indicated by blocks 240 and 242 in the flow chart of fig. 3.
FIG. 4 is a flow chart illustrating operation of the items in FIGS. 1 and 2 to automatically format a reply to a question message. First assume that user 118 has opened and operated his or her email system 142. This is indicated by block 250 in the flow chart of fig. 4. The email system 142 then receives an email message (e.g., a message composed by the user 112). This is indicated by block 252. The user 118 then selects the message for display. This is indicated by block 254. The electronic mail system 142 then displays the selected message for the user 118 in the reading pane. This is indicated by block 256. The user 118 then actuates the reply actuator to generate a reply to the email message. This is indicated by block 257.
Assuming for purposes of this discussion that the issue message processing logic 150 is similar to the logic 130 shown in FIG. 2, the recipient processing system 168 then detects that the user 118 is replying to the particular content (or particular text portion) in the received message. This is indicated by block 258 in the flow chart of fig. 4. In one example, nested reply identifier 200 identifies that a user is entering content nested with content received in a received message. This is indicated by block 260 in the flow chart of fig. 4. In another example, the copy and paste identifier 202 identifies that the recipient has copied and pasted a portion of the received message into the reply pane and is entering content in the reply pane relative to the copied and pasted portion. This is indicated by block 262 in fig. 4. In yet another example, the linguistic content identifier 204 identifies that the recipient is replying to a portion of the received email message based on a linguistic or semantic interpretation of content entered by the recipient in the reply pane. This is indicated by block 264. The particular content in the message that the recipient is detecting to be replying to the received message may also be identified in other ways, and this is indicated by block 266.
In one example, tag identifier logic 190 may then identify whether the received message has been marked as a problem message. This is indicated by block 268 in fig. 4. If so, the problem in the original message may also have been flagged. In this case, the reply tag generator logic 184 adds a tag to the content that the recipient is entering as a reply to the flagged question. This is indicated by block 270. As discussed above, the tag may identify it as a nested reply, as indicated by block 272, it may identify the user and date of the reply, as indicated by block 274, or it may be otherwise identified, and this is indicated by block 276.
However, at block 278, it is possible that the received message was not previously marked as a problem message. In this case, the question tag generator logic 182 then adds a tag to identify the particular text portion of the received message to which the user 118 is replying. This is indicated by block 278. For example, as discussed above, once a particular portion of text in the received message has been identified that the user is replying to, that particular portion of text is identified and marked by the question tag generator logic 182 as a question or point that the user is replying to. Subsequently, as indicated at block 270, the reply tag generator logic 184 again tags the recipient's reply to the question with a tag indicating that this is a reply to the previously tagged question.
Additionally, once a particular portion of a received message has been identified that the current recipient (user 118) is replying to, visual formatting logic 194 automatically formats the content entered by that recipient (user 118) to visually distinguish that content from other content in the reply message. This is indicated by block 280 in the flow chart of fig. 4. In one example, logic 194 formats the content to distinguish it from the original text in the message to which the recipient is replying. This is indicated by block 282. In another example, logic 194 formats the recipient's reply to distinguish it from any other flagged content (e.g., any other replies to the question by other recipients, etc.). This is indicated by blocks 284 and 286.
Logic 194 may do this in a variety of ways. For example, logic 194 may modify the font, color, line thickness, spacing, letter size, background color or shading, or a wide variety of other visual characteristics of the content being inserted by the recipient. This is indicated by block 288.
The link generator logic 196 may also add the name or other identifying information of the recipient, and it may also add links to other recipient information 154. This is indicated by block 290 in the flow chart of fig. 4. Logic 194 and logic 196 may also operate in a variety of other ways, and this is indicated by block 292.
Fig. 5A and 5B illustrate examples of user interface displays. Fig. 5A is an example of a user interface display 292 in the email system 142. It allows the user 118 to compose an email message or a reply message, or both. Display 292 illustratively includes a mailbox pane 294, a message list pane 296, and a composition pane 298. Mailbox pane 294 illustratively lists various mailboxes that the user has configured on the email system, such as an inbox, sent mailbox, draft box, and the like. Message list pane 296 illustratively includes identification information that identifies messages that have been received by a user into the user's inbox. The compose pane 298 illustratively allows a user to enter message content in order to compose or reply to a message.
In the example shown in fig. 5A, pane 298 includes a received message display pane 300 and a reply message composition pane 302. Received messages display pane 300 illustratively displays received messages that have been selected by user 118 from message list pane 296 for viewing. The user 118 then actuates the user input mechanism indicating that the user wishes to generate a reply to the message and the received message is displayed in pane 300, while reply message composition pane 302 allows the user to enter content for the reply message.
User 118 may do a number of different things in generating the reply message. For example, the user may place his or her cursor in the received message display pane 300, nest with the received message content, and begin typing a nested reply. In another example, as discussed above, the user 118 may copy and paste information from the received message shown in pane 300 into a reply message in pane 302 and enter the content of the response. In yet another example, the user may enter content into the pane 302 that indicates verbally that the user 118 is replying to a certain text portion or question in a received message.
In the example shown in fig. 5A, it can be seen that the user 118 has copied and pasted a particular content portion of the received message into the reply message composition pane 302, and it is identified as the content being replied to 304. The user then begins to enter content 306 in reply. As can be seen in FIG. 5A, the link generator logic 196 illustratively adds a link 308 that identifies the recipient 118 that is replying to and links to additional biometric information about the recipient. In addition, visual formatting logic 194 illustratively formats reply 306 (and link 308) to visually distinguish it from content 304 being replied to. Thus, the user (and subsequent recipients of the reply) may readily distinguish between the content 304 being replied to and the reply 306 associated with the user 118.
Fig. 5B is another example of a user interface display 310. Some of the items of user interface display 310 are similar to those shown on display 292 in FIG. 5A, and they are numbered similarly. In the example shown in fig. 5B, assume that the message received in pane 300 has been marked as a problem message. Thus, when the user 118 actuates a user input mechanism indicating that the user 118 wishes to generate a reply to the message, the visual formatting logic 194 generates a reply format, such as the reply format shown in pane 302. The reply message in pane 302 illustratively shows each of the questions 312 and 314 marked in the original received message in pane 300, and it also illustratively shows individual replies 316 and 318 from different recipients that have replied to the original message. Each of those replies 316-318 is formatted differently from each other and from the original text in the question 312 to which they respond. In addition, each of the replies 316-318 has a corresponding link 320-322 identifying the author of the particular reply.
In one example, FIG. 5B also shows that the link generator logic 196 generates a link 324 for the particular user 118 that is to input the response information and places a cursor 326 at a location where the user 118 only needs to begin inputting content to reply to the question 312. In one example, the visual formatting logic 194 also formats the link 324 and any content entered by the user 118 so that it is visually distinguished from other responses 316 and 318 and from the questions 312 to which it responds.
It can thus be seen that the present system advantageously saves processing and memory overhead and also reduces the network bandwidth requirements of the email system. By automatically detecting when a user is replying to a particular portion of a received email, and then automatically formatting the response to visually distinguish the user's reply from other replies, and from the original message content, the system avoids the need for the user to navigate to various formatting displays and select options for formatting the response. All this saves presentation overhead, which reduces processing and memory requirements. In addition, it increases the usability of the system and reduces user fatigue (which improves accuracy) because users can generate responses faster and they can distinguish individual user responses faster.
The discussion herein uses the term "automatically. "automatically" means that the operation is performed without further user input, except possibly initiating or authorizing the operation.
It will be noted that the above discussion describes a variety of different systems, components, and/or logic. It will be appreciated that these systems, components, and/or logic may include hardware items (e.g., processors and associated memory, or other processing components, some of which are described below) that perform the functions associated with those systems, components, and/or logic. Additionally, the system, components, and/or logic may include software that is loaded into memory and subsequently executed by a processor or server, or other computing component, as described below. The systems, components, and/or logic may also include different combinations of hardware, software, firmware, etc., some examples of which are described below. These are merely a few examples of different structures that may be used to form the above described systems, components, and/or logic. Other configurations may also be used.
The discussion also refers to processors and servers. In one embodiment, the processor and server comprise a computer processor with associated memory and timing circuitry (not separately shown). These processors and servers are functional parts of the systems or devices to which they belong and which are activated, and contribute to the functionality of other components or items in those systems.
In addition, a number of user interface displays are discussed. The user interface display may take a wide variety of different forms and may have a wide variety of different user actuatable input mechanisms disposed thereon. For example, the user actuatable input mechanism may be a text box, check box, icon, link, drop down menu, search box, or the like. These user-actuable input mechanisms may be actuated in a variety of different ways. For example, these user-actuatable input mechanisms may be actuated using a pointing and clicking device (e.g., a trackball or mouse). These user actuatable input mechanisms may be actuated using hardware buttons, switches, joysticks or keyboards, thumb switches (thumb switches) or thumb pads (thumb pads), and the like. These user-actuatable input mechanisms may also be actuated using a virtual keyboard or other virtual actuator. Additionally, where the screen on which the user actuatable input mechanisms are displayed is a touch sensitive screen, these user actuatable input mechanisms may be actuated using touch gestures. Further, where the device displaying the user actuatable input mechanisms has a speech recognition component, these user actuatable input mechanisms may be actuated using voice commands.
A plurality of data storage devices are also discussed. It is noted that each of these data storage devices may be divided into a plurality of data storage devices. All data storage devices may be local to the system to which they access, all data storage devices may be remote, or some data storage devices may be local while others are remote. All of these configurations are contemplated herein.
In addition, the figures illustrate several blocks, the functionality of which is attributed to each block. It is noted that fewer blocks may be used such that functions are performed by fewer components. Further, more blocks may be used, with functionality distributed among more components.
Fig. 6 is a block diagram of the architecture 100 shown in fig. 1, except that the elements of fig. 6 are disposed in a cloud computing architecture 500. Cloud computing provides computing, software, data access, and storage services that do not require end-user knowledge of the physical location or configuration of the systems delivering these services. In various embodiments, cloud computing delivers services over a wide area network (e.g., the internet) using appropriate protocols. For example, cloud computing providers deliver applications over a wide area network and may access these applications through a web browser or any other computing component. The software or components of architecture 100 and corresponding data may be stored on a server at a remote location. The computing resources in a cloud computing environment may be consolidated at a remote data center location or they may be dispersed. Cloud computing infrastructures can deliver services through shared data centers, although they appear as a single point of access to users. Accordingly, the components and functionality described herein may be provided from a service provider at a remote location using a cloud computing architecture. Alternatively, the components and functions described herein may be provided from a conventional server, or may be installed directly or otherwise on a client device.
This description is intended to include both public cloud computing and private cloud computing. Cloud computing (both public and private) provides a substantially seamless pool of resources, with a reduced need to manage and configure the underlying hardware infrastructure.
Public clouds are managed by vendors and typically support multiple customers using the same infrastructure. Furthermore, a public cloud, as opposed to a private cloud, can free end users from managing hardware. Private clouds may be managed by the organizations themselves and the infrastructure is not typically shared with other organizations. The mechanism will maintain the hardware to some extent (e.g., installation and repair, etc.).
In the example shown in fig. 6, some items are similar to those shown in fig. 1, and these items are numbered similarly. Fig. 6 specifically illustrates that computing systems 102 and 104 can be the same or different systems, and that they can be located in cloud 502 or outside of cloud 502. Fig. 6 also shows that email system 122 and/or email system 142 may be located in cloud 502 (which may be public, private, or a combination where some is public and others is private). They may also be the same email system. Thus, user 112 uses user device 504 to access those systems through cloud 502, and user 118 uses user device 506.
Fig. 6 also depicts another example of a cloud architecture. Fig. 6 illustrates that it is also contemplated that some elements of architecture 100 may be disposed in cloud 502 while other elements are not disposed in cloud 502. By way of example, data storage devices 122, 144 may be disposed outside of cloud 502 and accessed through cloud 502. In another example, the issue message processing logic 130, 150 may be external to the cloud 502. Regardless of where these elements are located, they may be accessed directly by devices 504 and 506 over a network (wide area network or local area network), they may be hosted by a service at a remote site, or they may be provided as a service through the cloud or accessed by a connection service residing in the cloud. All of these architectures are contemplated herein.
It is also noted that architecture 100, or portions thereof, may be disposed on a wide variety of different devices. Some of these devices include servers, desktop computers, laptop computers, tablet computers, or other mobile devices, such as palmtop computers, cellular phones, smart phones, multimedia players, personal digital assistants, and so forth.
FIG. 7 is a simplified block diagram of one illustrative example of a handheld or mobile computing device that may be used as the handheld device 16 in which a user or customer of the present system (or portion thereof) may be deployed. Fig. 8-9 are examples of handheld or mobile devices.
Fig. 7 provides a general block diagram of components of client device 16 that may run components of architecture 100 or interact with architecture 100 or both. In device 16, a communication link 13 is provided, which communication link 13 allows the handheld device to communicate with other computing devices and in some embodiments provides a channel for automatically receiving information, such as by scanning. Examples of communication links 13 include infrared ports, serial/USB ports, cable network ports (e.g., ethernet ports), and wireless network ports that allow communication via one or more communication protocols, including General Packet Radio Service (GPRS), LTE, HSPA + and other 3G and 4G wireless protocols, 1Xrtt, and short message services, which are wireless services for providing cellular access to the network, as well as Wi-Fi protocols and bluetooth protocols, which provide local wireless connectivity to the network.
In other examples, an application or system is received on a removable digital (SD) card connected to SD card interface 15. The SD card interface 15 and communication link 13 communicate with a processor 17 (which may also contain a processor or server from the previous figures) along a bus 19, where the bus 19 is also connected to a memory 21 and input/output (I/O) components 23 as well as a clock 25 and a position system 27.
In one embodiment, I/O components 23 are provided to facilitate input and output operations. The I/O components 23 of various embodiments of the device 16 may include input components (e.g., buttons, touch sensors, multi-touch sensors, optical or video sensors, voice sensors, touch screens, proximity sensors, microphones, tilt sensors, and gravity switches) and output components (e.g., display devices, speakers, and or printer ports). Other I/O components 23 may also be used.
Clock 25 illustratively includes a real-time clock component that outputs a time and date. Clock 25 may also illustratively provide timing functions for processor 17.
Location system 27 illustratively includes components that output the current geographic location of device 16. This may include, for example, a Global Positioning System (GPS) receiver, LORAN system, dead reckoning system, cellular triangulation system, or other positioning system. The location system 27 may also include mapping software or navigation software that generates desired maps, navigation paths, and other geographic functions, for example.
The memory 21 stores an operating system 29, network settings 31, applications 33, application configuration settings 35, a data storage device 37, a communication driver 39, and communication configuration settings 41. Memory 21 may include all types of volatile and non-volatile computer-readable storage devices. Memory 21 may also include computer storage media (described below). The memory 21 stores computer readable instructions that, when executed by the processor 17, cause the processor to perform computer implemented steps or functions in accordance with the instructions. Similarly, device 16 may have a client system 24 that may run various business applications or contain part or all of tenant 104. The processor 17 may also be activated by other components to facilitate the functionality of the other components.
Examples of the network settings 31 include such things as proxy information, internet connection information, and mappings. Application configuration settings 35 include settings that customize the application for a particular enterprise or user. The communication configuration settings 41 provide parameters for communicating with other computers and include items such as GPRS parameters, SMS parameters, connected user names and passwords.
The applications 33 may be applications that have been previously stored on the device 16 or applications that were installed during use, although these applications may be part of the operating system 29 or also hosted outside of the device 16.
FIG. 8 illustrates one embodiment in which the device 16 is a tablet computer 600. In fig. 8, a computer 600 is shown having a user interface display screen 602. The screen 602 may be a touch screen (such that touch gestures from a user's finger may be used to interact with an application) or a pen-enabled interface that receives input from a pen or stylus. The computer 600 may also use an on-screen virtual keyboard. Of course, the computer 600 may also be attached to a keyboard or other user input device, for example, by an appropriate attachment mechanism (e.g., a wireless link or a USB port). Computer 600 may also illustratively receive speech input.
Fig. 9 shows that the device may be a smartphone 71. The smartphone 71 has a touch sensitive display 73, the touch sensitive display 73 displaying icons or tiles or other user input mechanisms 75. The mechanism 75 may be used by a user to run applications, place a phone call, perform data transfer operations, and so forth. Typically, the smart phone 71 builds on a mobile operating system and provides more advanced computing power and connectivity than a feature phone.
It is noted that other forms of device 16 are possible.
Fig. 10 is an example of a computing environment in which the architecture 100, or portions thereof, may be deployed, for example. With reference to FIG. 10, an exemplary system for implementing some embodiments includes a general purpose computing device in the form of a computer 810. Components of computer 810 may include, but are not limited to, a processing unit 820 (which may include a processor or server from the previous figures), a system memory 830, and a system bus 821 that couples various system components including the system memory to the processing unit 820. The system bus 821 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus. The memory and programs described with respect to fig. 1 and 2 may be deployed in corresponding portions of fig. 10.
Computer 810 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 810 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. The computer storage medium is distinct from and does not include a modulated data signal or a carrier wave. Computer storage media includes hardware storage media including both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 810. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a transport mechanism and includes any information delivery media. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 830 includes computer storage media in the form of volatile and/or nonvolatile memory such as Read Only Memory (ROM)831 and Random Access Memory (RAM) 832. A basic input/output system 833(BIOS), containing the basic routines that help to transfer information between elements within computer 810, such as during start-up, is typically stored in ROM 831. RAM 832 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 820. By way of example, and not limitation, fig. 10 illustrates operating system 834, application programs 835, other program modules 836, and program data 837.
The computer 810 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only, fig. 10 illustrates a hard disk drive 841 and an optical disk drive 855, the hard disk drive 841 reading from or writing to non-removable, nonvolatile magnetic media, the optical disk drive 855 reading from or writing to a removable, nonvolatile optical disk 856 such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive 841 is typically connected to the system bus 821 through a non-removable memory interface such as interface 840, and the optical disk drive 855 is typically connected to the system bus 821 by a removable memory interface, such as interface 850.
Alternatively or additionally, the functionality described herein may be performed, at least in part, by one or more hardware logic components. By way of example, and not limitation, illustrative types of hardware logic components that may be used include Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), program specific standard products (ASSPs), system on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and so forth.
The drives and their associated computer storage media discussed above and illustrated in FIG. 10, provide storage of computer readable instructions, data structures, program modules and other data for the computer 810. In fig. 10, for example, hard disk drive 841 is illustrated as storing operating system 844, application programs 845, other program modules 846, and program data 847. Note that these components can either be the same as or different from operating system 834, application programs 835, other program modules 836, and program data 837. Operating system 844, application systems 845, other program modules 846, and program data 847 are given different numbers here to illustrate that, at a minimum, they are different copies.
A user may enter commands and information into the computer 810 through input devices such as a keyboard 862, a microphone 863, and a pointing device 861 (e.g., a mouse, trackball or touch pad). Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 820 through a user input interface 860 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a Universal Serial Bus (USB). A visual display 891 or other type of display device is also connected to the system bus 821 via an interface, such as a video interface 890. In addition to the monitor, computers may also include other peripheral output devices such as speakers 897 and printer 896, which may be connected through an output peripheral interface 895.
The computer 810 operates in a networked environment using logical connections to one or more remote computers, such as a remote computer 880. The remote computer 880 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 810. The logical connections depicted in FIG. 10 include a Local Area Network (LAN)871 and a Wide Area Network (WAN)873, but may also include other networks. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
When used in a LAN networking environment, the computer 810 is connected to the LAN 871 through a network interface or adapter 870. When used in a WAN networking environment, the computer 810 typically includes a modem 872 or other means for establishing communications over the WAN 873, such as the Internet. The modem 872, which may be internal or external, may be connected to the system bus 821 via the user input interface 860, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 810, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation, FIG. 10 illustrates remote application programs 855 as residing on remote computer 880. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
It should also be noted that the different embodiments described herein may be combined in different ways. That is, portions of one or more embodiments may be combined with portions of one or more other embodiments. All of which are contemplated herein.
Example 1 is a computing system, comprising:
an electronic mail (email) system that generates a user interface having a reply pane for inputting message content to reply to a received electronic mail message to generate a reply message;
a recipient processing system that detects that a recipient is entering content to reply to a particular text portion of message content in a received email message and controls the email system to identify the particular text portion as a subset of the message content in the received email message; and
visual formatting logic that automatically controls the email system to format content being entered by the recipient to display the content being entered by the recipient in the same pane as the particular text portion of the message content and to visually distinguish the content being entered by the recipient from the particular text portion of the message content and from other replies to the particular text portion of the message content by other recipients.
Example 2 is the computing system of any or all of the preceding examples and further comprising:
question tag generator logic to tag the particular portion of text with a first tag indicating that the particular portion of text is an item replied to by content that the recipient is entering.
Example 3 is the computing system of any or all of the preceding examples and further comprising:
reply tag generator logic to tag content being entered by the recipient with a second tag indicating that the content being entered by the recipient is a reply to an item tagged by the first tag.
Example 4 is the computing system of any or all of the preceding examples, wherein the recipient processing system comprises:
a nested reply identifier that detects that the recipient is entering content nested with the message content in the received email message and immediately subsequent to the particular text portion of the received email message.
Example 5 is the computing system of any or all of the preceding examples, wherein the recipient processing system comprises:
a copy and paste identifier that detects that the recipient is copying the particular text portion of the message content from the received email message into a reply message, and that also detects that the recipient is entering content in the reply message immediately after the copied particular text portion to reply to the particular text portion.
Example 6 is the computing system of any or all of the preceding examples and further comprising:
a language content identifier that detects a language interpretation of content input by the recipient, the language interpretation indicating that the content input by the recipient is a reply to the particular text portion of the message content in the received email message.
Example 7 is the computing system of any or all of the preceding examples, wherein the recipient processing system comprises:
link generator logic that automatically generates a user actuatable link to user information corresponding to the recipient proximate to content input by the recipient.
Example 8 is the computing system of any or all of the preceding examples and further comprising:
an author processing system that identifies whether the received message, when composed by an author, conforms to a predefined problem pattern; and
message tag generator logic that generates a message tag indicating that the received message conforms to the predefined problem pattern.
Example 9 is the computing system of any or all of the preceding examples, wherein the author processing system comprises:
character analysis logic that determines whether the received message, at the time of composition, conforms to the predefined question pattern based on characters entered in the message content.
Example 10 is the computing system of any or all of the preceding examples, wherein the author processing system comprises:
language content analysis logic that determines whether the received message, at the time of composition, conforms to the predefined question pattern based on a language interpretation of the message content.
Example 11 is the computing system of any or all of the preceding examples, wherein the author processing system comprises:
user interaction logic that determines, based on user interaction, whether the received message, at the time of composition, conforms to the predefined question pattern.
Example 12 is the computing system of any or all of the preceding examples and further comprising:
issue tag generator logic that marks different portions of content in the received message as items that can be responded to by the recipient based on the author processing system determining that the received message conforms to the predefined issue pattern.
Example 13 is a computer-implemented method, comprising:
generating an electronic mail user interface having a reply pane in an electronic mail (email) system for inputting message content to reply to a received electronic mail message to generate a reply message;
detecting that a recipient is entering content to reply to a particular text portion of message content in a received email message;
control the email system to identify the particular text portion as a subset of the message content in the received email message; and
automatically controlling the electronic mail system to format content being entered by the recipient to display the content being entered by the recipient in the same pane as the particular text portion of the message content and to visually distinguish the content being entered by the recipient from the particular text portion of the message content.
Example 14 is the computer-implemented method of any or all of the preceding examples, wherein automatically controlling the email system to format content comprises:
detecting another reply to the particular portion of text from another recipient; and
automatically controlling the email system to format content being entered by the recipient to visually distinguish the content being entered by the recipient from the other reply from the other recipient.
Example 15 is a computer-implemented method of any or all of the preceding examples and further comprising:
tagging the particular portion of text with a first tag indicating that the particular portion of text is an item replied to by content being entered by the recipient; and
tagging content being input by the recipient with a second tag indicating that the content being input by the recipient is a reply to the item tagged by the first tag.
Example 16 is the computer-implemented method of any or all of the preceding examples, wherein detecting that the recipient is entering content to reply to a particular text portion of the message content comprises:
detecting that the recipient is entering content nested with the message content in the received email message and immediately following the particular text portion of the received email message.
Example 17 is the computer-implemented method of any or all of the preceding examples, wherein detecting that the recipient is entering content to reply to a particular text portion of the message content comprises:
detecting that the recipient is copying the nominal text portion of the message content from the received email message into a reply message; and
detecting that the recipient is entering content in the reply message immediately after the copied particular text portion to reply to the particular text portion.
Example 18 is the computer-implemented method of any or all of the preceding examples, wherein detecting that the recipient is entering content to reply to a particular text portion of the message content comprises:
detecting a language interpretation of content input by the recipient, the language interpretation indicating that content input by the recipient is a reply to the particular text portion of the message content in the received email message.
Example 19 is a computing system, comprising:
an electronic mail (email) system that generates a user interface having a reply pane for inputting message content to reply to a received electronic mail message in order to generate a reply message;
a recipient processing system that detects that a recipient is entering content to reply to a particular text portion of message content in a received email message and controls the email system to identify the particular text portion as a subset of the message content in the received email message, the recipient processing further comprising identifying another reply to the particular text portion by another recipient; and
visual formatting logic that automatically controls the email system to format content being entered by the recipient to display the content being entered by the recipient in the same pane as the particular text portion of the message content and to visually distinguish the content being entered by the recipient from the particular text portion of the message content and from the other reply to the particular text portion of the message content by the other recipient.
Example 20 is the computing system of any or all of the preceding examples and further comprising:
question tag generator logic to tag the particular portion of text with a first tag indicating that the particular portion of text is an item replied to by content that the recipient is entering.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (20)

1. A computing system, comprising:
a processor; and
a memory storing instructions executable by the processor, wherein the instructions, when executed, cause the computing system to:
generating a user interface including a compose pane representing an electronic message composed by a user;
generating message content in the electronic message based on input from the user in the compose pane;
automatically determining, based on characters in the message content, that the message content composed by the user in the compose pane conforms to a predefined question pattern;
generating a message tag in response to the determination, the message tag indicating that the electronic message conforms to the predefined problem pattern; and
sending the electronic message including the message tag to a recipient.
2. The computing system of claim 1, wherein the instructions cause the computing system to:
the question label is associated with a particular portion of the generated message content.
3. The computing system of claim 1,
the particular portion of the generated message content comprises a first portion, and
the characters include characters in a second portion of the generated message content, the second portion being different from the first portion.
4. The computing system of claim 1, wherein the instructions cause the computing system to:
generating a user input mechanism that is selectively actuatable by the user to confirm the message tag.
5. The computing system of claim 1, wherein the instructions cause the computing system to:
determining that the electronic message conforms to the predefined problem pattern based on a language interpretation of the message content.
6. The computing system of claim 1 wherein the electronic message comprises an electronic mail (email) message and the message tag identifies the email message as a problem message for an email system corresponding to the recipient.
7. The computing system of claim 1, wherein the instructions cause the computing system to:
identifying a plurality of different portions of the message content;
generating one or more issue tags associated with the plurality of different portions; and
sending the electronic message containing the one or more issue tags to the recipient.
8. The computing system of claim 7, wherein the one or more question tags identify the plurality of different portions as items that can be responded to by the recipient of the electronic message for a recipient electronic messaging system corresponding to the recipient.
9. The computing system of claim 8, wherein the recipient electronic messaging system is configured to: formatting the electronic message based on the one or more issue tags.
10. The computing system of claim 9, wherein the recipient electronic messaging system is configured to: detecting the recipient input content to reply to a particular text portion and formatting the content input by the recipient to display the content in the same pane as the particular text portion of the message content and visually distinguish the content from the particular text portion of the message content and other replies to the particular text portion of the message content by other recipients.
11. A computer-implemented method, comprising:
generating a user interface including a compose pane corresponding to an electronic mail (email) message composed by a user;
generating message content in the email message based on input from the user in the compose pane;
determining that the email message composed by the user in the compose pane conforms to a predefined problem pattern;
generating a message tag indicating that the email message conforms to the predefined problem pattern; and
and sending the email message containing the message tag to a receiver.
12. The computer-implemented method of claim 11, wherein determining that the email message conforms to a predefined problem pattern comprises:
determining that the email message conforms to the predefined problem pattern based on characters entered in the message content.
13. The computer-implemented method of claim 11, wherein determining that the email message conforms to a predefined problem pattern comprises:
determining that the email message conforms to the predefined problem pattern based on a language interpretation of the message content.
14. The computer-implemented method of claim 11, wherein determining that the email message conforms to a predefined problem pattern comprises:
generating a user input mechanism that is selectively actuatable by the user to generate the message tag.
15. The computer-implemented method of claim 11, further comprising:
identifying a plurality of different portions of the message content;
generating one or more issue tags associated with the plurality of different portions; and
sending the email message including the one or more question tags to the recipient.
16. A computing system, comprising:
a processor; and
a memory storing instructions executable by the processor, wherein the instructions, when executed, cause the computing system to:
generating a user interface comprising a reply pane representing a reply electronic message that is a reply to a first electronic message received by a recipient user, wherein,
the first electronic message includes first message content, and
the reply pane is configured to: receiving input from the recipient user to generate second message content in the reply electronic message;
determining that the second message content is a reply to first message content in the first electronic message based on a language interpretation of the second message content entered by the recipient user in the reply pane;
generating a question tag associated with the first message content based on the determination; and
sending the reply electronic message containing the question tag to one or more recipients.
17. The computing system of claim 16, wherein the instructions cause the computing system to:
detecting content of the recipient user input that is nested with message content in the first electronic message and immediately follows a text portion in the first electronic message; and
a second question tag associated with a second text portion is generated based on the detecting.
18. The computing system of claim 16, wherein the instructions cause the computing system to:
detecting that the recipient user copied a text portion of the message content from the first electronic message into the reply electronic message and entered content in the reply electronic message immediately after the copied second text portion; and
generating a second question tag associated with the second text portion based on the detecting.
19. The computing system of claim 16, wherein the instructions cause the computing system to:
automatically generating a user-actuatable link to user information corresponding to the recipient user proximate to the message content entered by the recipient user.
20. The computing system of claim 16, wherein the instructions cause the computing system to:
formatting the message content entered by the recipient user to display the message content in the same pane as a particular text portion of the message content and visually distinguishing the message content from the particular text portion of the message content and other replies to the particular text portion of the message content by other recipients.
CN202111520271.6A 2016-06-16 2017-06-09 Nested collaboration in email Active CN114095466B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111520271.6A CN114095466B (en) 2016-06-16 2017-06-09 Nested collaboration in email

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US15/183,939 2016-06-16
US15/183,939 US10645036B2 (en) 2016-06-16 2016-06-16 In-line collaboration in e-mail
PCT/US2017/036660 WO2017218313A1 (en) 2016-06-16 2017-06-09 In-line collaboration in e-mail
CN201780036442.3A CN109313749B (en) 2016-06-16 2017-06-09 Nested collaboration in email
CN202111520271.6A CN114095466B (en) 2016-06-16 2017-06-09 Nested collaboration in email

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201780036442.3A Division CN109313749B (en) 2016-06-16 2017-06-09 Nested collaboration in email

Publications (2)

Publication Number Publication Date
CN114095466A true CN114095466A (en) 2022-02-25
CN114095466B CN114095466B (en) 2023-10-17

Family

ID=59078238

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201780036442.3A Active CN109313749B (en) 2016-06-16 2017-06-09 Nested collaboration in email
CN202111520271.6A Active CN114095466B (en) 2016-06-16 2017-06-09 Nested collaboration in email

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201780036442.3A Active CN109313749B (en) 2016-06-16 2017-06-09 Nested collaboration in email

Country Status (4)

Country Link
US (2) US10645036B2 (en)
EP (1) EP3472775A1 (en)
CN (2) CN109313749B (en)
WO (1) WO2017218313A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10432568B2 (en) * 2016-03-31 2019-10-01 Microsoft Technology Licensing, Llc Automated classification and time-based relevancy prioritization of electronic mail items
US12099797B2 (en) * 2022-12-12 2024-09-24 Microsoft Technology Licensing, Llc Techniques for automatically adjusting font attributes for inline replies in email messages

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1248744A (en) * 1998-09-14 2000-03-29 夏普公司 Information processor and memory medium with computer red recovery program
US20020129109A1 (en) * 2001-03-09 2002-09-12 Pioneer Corporation Electronic mail processing system and mail server
US20060179038A1 (en) * 2005-02-04 2006-08-10 Sbc Knowledge Ventures, L.P. Presenting FAQ's during a task of entering an e-mail message
US20070219794A1 (en) * 2006-03-20 2007-09-20 Park Joseph C Facilitating content generation via messaging system interactions
EP1918825A1 (en) * 2006-11-03 2008-05-07 Research In Motion Limited System and method for replying to an electronic mail message
CN101179620A (en) * 2006-11-30 2008-05-14 腾讯科技(深圳)有限公司 Method and system of implementing automatic answer of server
US20090024706A1 (en) * 2007-07-19 2009-01-22 Janani Janakiraman Granularly selecting a subset of recipients who can reply to a sender's e-mail
CN101690280A (en) * 2007-06-14 2010-03-31 雅虎公司 Mobile contextual sms advertising
CN101771622A (en) * 2008-12-31 2010-07-07 华为技术有限公司 E-mail automatic replying method, device and system
US20110131279A1 (en) * 2009-11-30 2011-06-02 International Business Machines Corporation Managing Electronic Messages
US20110191428A1 (en) * 2010-02-03 2011-08-04 Palo Alto Research Center Incorporated System And Method For Content Tagging And Distribution Through Email
US20130007144A1 (en) * 2011-06-30 2013-01-03 International Business Machines Corporation Email question object ownership and status tracking
CN104268129A (en) * 2014-08-28 2015-01-07 小米科技有限责任公司 Message reply method and message reply device
US20150106877A1 (en) * 2013-10-14 2015-04-16 Microsoft Corporation Granting permissions to an object when adding people to a conversation
CN105447207A (en) * 2016-01-08 2016-03-30 北京光年无限科技有限公司 Interactive questioning and answering method and system for intelligent robot

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7246118B2 (en) 2001-07-06 2007-07-17 International Business Machines Corporation Method and system for automated collaboration using electronic book highlights and notations
US20050027779A1 (en) 2003-07-29 2005-02-03 Schinner Charles Edward System and method for organizing email messages
US20050033811A1 (en) 2003-08-07 2005-02-10 International Business Machines Corporation Collaborative email
US7269621B2 (en) 2004-03-31 2007-09-11 Google Inc. Method system and graphical user interface for dynamically updating transmission characteristics in a web mail reply
WO2006034384A1 (en) 2004-09-21 2006-03-30 Netomat, Inc. Mobile messaging system and method
ATE540000T1 (en) 2005-08-31 2012-01-15 Fmc Corp AUTOXIDATIVE PRODUCTION OF HYDROGEN PEROXIDE USING OXIDATION IN A MICROREACTOR
US7603424B2 (en) 2005-11-03 2009-10-13 Research In Motion Limited Method and system for generating template replies to electronic mail messages
US20080086530A1 (en) * 2006-10-09 2008-04-10 Gandhi Rajeev H System and method for restricting replies to an original electronic mail message
US9923850B2 (en) 2007-01-31 2018-03-20 Tmail Inc. System and computer program product for transactional, addressable communication
US20090204803A1 (en) 2008-02-11 2009-08-13 Nvidia Corporation Handling of secure storage key in always on domain
US8225219B2 (en) * 2008-02-12 2012-07-17 Microsoft Corporation Identifying unique content in electronic mail messages
US8510646B1 (en) 2008-07-01 2013-08-13 Google Inc. Method and system for contextually placed chat-like annotations
US8484297B2 (en) 2008-07-31 2013-07-09 Palo Alto Research Center Incorporated Method for collaboratively tagging and highlighting electronic documents
US7546352B1 (en) * 2008-08-15 2009-06-09 International Business Machines Corporation Method to automatically merge e-mail replies
US8769022B2 (en) * 2009-08-31 2014-07-01 Qualcomm Incorporated System and method for evaluating outbound messages
US8856664B2 (en) 2012-05-24 2014-10-07 International Business Machines Corporation Prompting of recipient expertise in collaboration environment
US20150106685A1 (en) 2012-10-12 2015-04-16 Thrivon Management Consulting Transforming a document into web application
US9143468B1 (en) * 2013-01-08 2015-09-22 Twitter, Inc. Identifying relevant messages in a conversation graph
US9319374B2 (en) * 2013-08-29 2016-04-19 Intuit Inc. Personalized bookmarking of textsite applications via a text message
US9436755B1 (en) * 2014-01-26 2016-09-06 Google Inc. Determining and scoring task indications
US11340769B2 (en) 2014-03-31 2022-05-24 Microsoft Technology Licensing, Llc Generating content items out of an electronic communication workflow
KR102305525B1 (en) * 2015-06-09 2021-09-27 삼성전자주식회사 SCHEME for sharing USER profile INFORMATION Using user equipment in mobile communication system
US10268340B2 (en) * 2015-06-11 2019-04-23 International Business Machines Corporation Organizing messages in a hierarchical chat room framework based on topics
US20170024462A1 (en) * 2015-07-23 2017-01-26 International Business Machines Corporation Associating a text message containing an answer with a text message containing a question
US11461412B2 (en) * 2015-11-25 2022-10-04 International Business Machines Corporation Knowledge management and communication distribution within a network computing system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1248744A (en) * 1998-09-14 2000-03-29 夏普公司 Information processor and memory medium with computer red recovery program
US20020129109A1 (en) * 2001-03-09 2002-09-12 Pioneer Corporation Electronic mail processing system and mail server
US20060179038A1 (en) * 2005-02-04 2006-08-10 Sbc Knowledge Ventures, L.P. Presenting FAQ's during a task of entering an e-mail message
US20070219794A1 (en) * 2006-03-20 2007-09-20 Park Joseph C Facilitating content generation via messaging system interactions
EP1918825A1 (en) * 2006-11-03 2008-05-07 Research In Motion Limited System and method for replying to an electronic mail message
CN101179620A (en) * 2006-11-30 2008-05-14 腾讯科技(深圳)有限公司 Method and system of implementing automatic answer of server
CN101690280A (en) * 2007-06-14 2010-03-31 雅虎公司 Mobile contextual sms advertising
US20090024706A1 (en) * 2007-07-19 2009-01-22 Janani Janakiraman Granularly selecting a subset of recipients who can reply to a sender's e-mail
CN101771622A (en) * 2008-12-31 2010-07-07 华为技术有限公司 E-mail automatic replying method, device and system
US20110131279A1 (en) * 2009-11-30 2011-06-02 International Business Machines Corporation Managing Electronic Messages
US20110191428A1 (en) * 2010-02-03 2011-08-04 Palo Alto Research Center Incorporated System And Method For Content Tagging And Distribution Through Email
US20130007144A1 (en) * 2011-06-30 2013-01-03 International Business Machines Corporation Email question object ownership and status tracking
US20150106877A1 (en) * 2013-10-14 2015-04-16 Microsoft Corporation Granting permissions to an object when adding people to a conversation
CN104268129A (en) * 2014-08-28 2015-01-07 小米科技有限责任公司 Message reply method and message reply device
CN105447207A (en) * 2016-01-08 2016-03-30 北京光年无限科技有限公司 Interactive questioning and answering method and system for intelligent robot

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭庆琳, 樊孝忠: "基于自然语言理解的自动应答系统", 计算机工程, no. 13 *

Also Published As

Publication number Publication date
CN109313749A (en) 2019-02-05
CN114095466B (en) 2023-10-17
US11558318B2 (en) 2023-01-17
EP3472775A1 (en) 2019-04-24
US20170366484A1 (en) 2017-12-21
US20200267101A1 (en) 2020-08-20
WO2017218313A1 (en) 2017-12-21
US10645036B2 (en) 2020-05-05
CN109313749B (en) 2022-01-11

Similar Documents

Publication Publication Date Title
US10936808B2 (en) Document linking in an electronic messaging system
US10587539B2 (en) Identifying relationships between message threads
US11669677B2 (en) Integrating an application for surfacing data on an electronic message pane
US11153245B2 (en) Dynamically re-parenting email messages based on updated conversations
US20180091458A1 (en) Actionable messages in an inbox
US20160026944A1 (en) Identifying new display elements in a unified thread
EP2812810A1 (en) Language independent probabilistic content matching
US11558318B2 (en) In-line collaboration in e-mail
WO2023075911A1 (en) Creation and consumption of non-electronic mail (email) social media content from within an email system
WO2016014322A1 (en) Taking in-line contextual actions on a unified display
US20150356061A1 (en) Summary view suggestion based on user interaction pattern
US20160026953A1 (en) In-line creation of activities on a unified display
US11457048B2 (en) User selectable document state identifier mechanism
US10554598B2 (en) Accessibility processing when making content available to others
US20220124061A1 (en) Surfacing media conversations and interactive functionality within a message viewer of a messaging system
US11671383B2 (en) Natural language service interaction through an inbox
US10645052B2 (en) Service integration into electronic mail inbox
CN106415626B (en) Group selection initiated from a single item
US20230161962A1 (en) System for automatically augmenting a message based on context extracted from the message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant